In this article, we'll look at why security awareness training is so important, advantages and disadvantages of developing your own program or contracting with specialists, and what a good security awareness training program should include.
With the advance of computing into the world of mobility, has the requirement for antivirus deprecated or is this a case of complacency. Some vendors are claiming that they can get rid of pattern files and others are saying no antivirus altogether. In this article we explore the options and the reality.
DeviceLock was selected the winner in the Endpoint Security category of the WindowSecurity.com Readers' Choice Awards. GFI EndPointSecurity and CopyNotify! Data Security Software were runner-up and second runner-up respectively.
This article will go beyond previous discussions on this site about mobile security threats and examine how you may be able to tame the emerging monster that BYOD is becoming.
Event Log Consolidator allows you to view, consolidate, and dismiss event logs and correlate issues among multiple Windows systems quickly and easily from one central location.
‘Democracy demands accountability’